Browse Definitions :
Definition

graphene transistor

A graphene transistor is a nanoscale device based on graphene, a component of graphite with electronic properties far superior to those of silicon. The device is a single-electron transistor, which means that a single electron passes through it at any one time.

A research team led by Professor Andre Geim of the Manchester Centre for Mesoscience and Nanotechnology built a graphene transistor and described it in the March 2007 issue of Nature magazine.

Features of the graphene transistor include:

  • the ability to operate at room temperature.
  • a size one atom by 10 atoms wide.
  • extreme sensitivity.
  • the ability to operate with the application of very low voltages.

These qualities mean that graphene-based processors could be a fast, low-power successor to silicon-based processors and enable advances in microchip technology beyond the capabilities of those using silicon as their semiconductor material. Electrons can move through graphene at speeds ten to one thousand times greater than silicon. Furthermore, unlike silicon, graphene's properties actually improve as the devices become smaller. That capacity, coupled with the ability to operate at room temperature, could allow more miniaturization which would, in turn, allow more components to be placed on an integrated circuit (IC).

Scientists have predicted that graphene transistors could scale to transistor channels as small as two nanometers (nm) with terahertz speeds.

Learn More About IT:
> Science Daily reported that 'New Graphene Transistor Promises Life After Death Of Silicon Chip.'
> Photonics.com describes the graphene transistor.

This was last updated in July 2008

SearchCompliance

  • information governance

    Information governance is a holistic approach to managing corporate information by implementing processes, roles, controls and ...

  • enterprise document management (EDM)

    Enterprise document management (EDM) is a strategy for overseeing an organization's paper and electronic documents so they can be...

  • risk assessment

    Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.

SearchSecurity

  • cyber espionage

    Cyber espionage, also called cyber spying, is a form of cyber attack that is carried out against a competitive company or ...

  • virus (computer virus)

    A computer virus is malicious code that replicates by copying itself to another program, computer boot sector or document and ...

  • honeypot (computing)

    A honeypot is a network-attached system set up as a decoy to lure cyber attackers and detect, deflect and study hacking attempts ...

SearchHealthIT

SearchDisasterRecovery

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • call tree

    A call tree is a layered hierarchical communication model that is used to notify specific individuals of an event and coordinate ...

  • Disaster Recovery as a Service (DRaaS)

    Disaster recovery as a service (DRaaS) is the replication and hosting of physical or virtual servers by a third party to provide ...

SearchStorage

  • dropout

    Dropout refers to data, or noise, that's intentionally dropped from a neural network to improve processing and time to results.

  • cloud storage

    Cloud storage is a service model in which data is transmitted and stored on remote storage systems, where it is maintained, ...

  • cloud testing

    Cloud testing is the process of using the cloud computing resources of a third-party service provider to test software ...

Close